Transcription

1 American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System

2 Overview About American Public University System (APUS) What is a Multi-Disciplinary Approach? What Problems does it help solve? Complex Malicious Code Cascade Failures for Infrastructures Hackers Bypass Defensive Technologies Problems require a Multi-Disciplinary Education Management and Coordination of Cybersecurity Technologies APUS Goal for Cybersecurity Education Summarized Admission Requirements Overview of the APUS Cybersecurity Program APUS Offers Undergrad Certificates APUS awarded National Certifications for Cybersecurity Education

3 About APUS Founded in 1991 as American Military University (AMU) by James P. Etter, USMC Fully-online; intended for military and working adults with focus on counter-terrorism, military intelligence In 2002 expanded to American Public University System, adding American Public University for public service courses, i.e. criminal justice and national security APUS accredited by the Higher Learning Commission, North Central Association

4 About APUS (con t) Today more than 100,000 students from all 50 states/dc and 100+ countries Approximately 53% active-duty all branches; 47% civilian or other military Recent Awards US News & World Report 2014 Online Rankings: APUS Undergraduate Programs Rated Among Best in Overall Quality First Three-Time Recipient of Sloan Consortium Effective Practice Award

5 About APUS (con t) Some of the Organizations that Partner with APUS -- Education Institutions of all Military Service Branches Department of Homeland Security FBI Lockheed Martin Center for Security Analysis - and many other universities and organizations

6 What is a Multi-Disciplinary Approach to Cybersecurity? Definition of Multi-Disciplinary cooperation and participation across different sectors to solve problems. Why is a Multi-Disciplinary approach to Cybersecurity now important? Sometimes, skill-centered specialists cultivate a traditional boundary around their expertise. This can be a restrictive way of finding solutions to a problem. Cybersecurity is being hit with newer types of problems that bypass traditional boundaries

7 What Problems does a Multi-Disciplinary Approach Help Solve? Problem #1 Cyberattacks are becoming more complex. Complexity shows in newer, advanced persistent threats that defeat increasingly sophisticated cybersecurity defensive technologies. Cybersecurity experts are always playing catch up after newer methods of cyberattack are discovered.

8 Complex Malicious Code Operates Undetected for Years Complex malicious code can reside and operate undetected inside computers for years before discovery. The STUXNET malicious code operated inside Iranian nuclear facilities for several years before it was eventually discovered. The new SNAKE malicious code, recently announced as a new discovery inside Ukrainian computers, may also have infected other computers worldwide and operated secretly for the past several years.

9 Cascade Failures May Connect Critical Infrastructures Problem #2 - Critical infrastructures are subject to complex cascade-failures due to vulnerabilities in other distantlyrelated infrastructures. During Sandy, the hospitals in New Jersey lost electricity when the local power utility flooded. When Hospital backup diesel generators ran out of fuel, filling stations had no electricity to pump fuel into delivery tankers.

11 Problems Require a Multi-Disciplinary Education Problems of Complexity, Cascade Failures, and Targeted Users now require a multi-disciplinary approach to cybersecurity education. Leaders in all professions, all disciplines must develop a cybersecurity mindset. The ACM Education Board in 2013 acknowledged that a systemwide perspective has become an important part of cybersecurity education, and that education must be multi-disciplinary, to include many sectors.

12 Management and Coordination of Cybersecurity Technology Traditional cybersecurity education courses were initially designed to expand the technical skills of technology experts. Management and Coordination of technology must now be emphasized in Cybersecurity Education. Cybersecurity Education must now range across many sectors, not focus just on the development and operation of security technology.

13 APUS Goal for Cybersecurity Education Leaders in All Disciplines need Cybersecurity Education to help manage and coordinate technology for cybersecurity - Business Education Public Safety International Relations Environmental Science Space Studies Sports and Healthcare Transportation and Logistics Students may enroll in the APUS Cybersecurity Program with an IT certificate, or with a non-technical work background

14 APUS Admissions Requirements Students enrolling for Cybersecurity must meet one of these requirements --- Undergraduate degree in Information Technology or a related field or Undergraduate IT Certificate or FIVE years of work experience at the senior level in Criminal Justice, Emergency Management, Intelligence, Homeland Security or other non-technical background

15 APUS Cybersecurity Programs First half of the graduate cybersecurity program focuses on network security, information assurance, cybercrime, and digital forensics. Second half of grad program focuses on policies, practices, perspectives of different disciplines, including emergency management, homeland security, intelligence, law and ethics, risk management and cyber warfare. The capstone course is a multi-disciplinary group project where individual participants represent different sectors, agencies, and disciplines. Graduate certificates are available in: Cybercrime Digital Forensics Information Assurance Information Systems Security Undergraduate certificates also available in: Digital Forensics Information Assurance Homeland Security National Security Emergency Management

16 APUS Awarded National Certifications for Cybersecurity Education APUS received two National Training Standards certifications for Information Systems Security Professionals from the Committee on National Security Systems (CNSS) NSTISSI no and CNSSI no APUS is also applying for the CAE/IA/CD designation from DHA and NSA.

17 For Further Information Clay Wilson, Phd, CISSP Program Director, Cybersecurity Studies American Public University System Undergraduate programs Graduate programs

MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

EXECUTIVE SEARCH PROFILE PROVOST & EXECUTIVE VICE PRESIDENT 1 THE OPPORTUNITY The next provost of the American Public University System will be a strong leader who will build new academic programs, guarantee

Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS Introduction Every year, cyber criminals become stronger and more sophisticated

New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview

ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,

The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

Incident Response Summary of Expertise and Experience 2015 The copyright to this document is owned by Symantec. No part of this document may be reproduced, stored in a retrieval system, or transmitted,

Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a

Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of

CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY CYBER HYGIENE AND ORGANIZATIONAL PLANNING ARE AT LEAST AS INTEGRAL TO SECURING INFORMATION NETWORKS AS FIREWALLS AND ANTIVIRUS SOFTWARE Cybersecurity

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council 5.5 For the Year Ended December 31, 2013 Penetration Tests 5.5. Penetration Tests Table

Flipping the Script: Law Firms Hunted by Cybercriminals Introduction As businesses put more resources into defending against cyber threats, cybercriminals have shifted tactics to focus on easier-to-exploit

UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum

Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted

SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern

Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Oversight and Government Reform Subcommittee on Information Technology

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information